Abstract
The results of analyzing the mechanisms and channels for replicating user data have been given. The replication mechanisms have been classified. Their advantages and drawbacks have been found. A method has been proposed that uses NFC to establish the secure data replication channel.
Similar content being viewed by others
References
Padgette, J., Scarfone, K., and Chen, L., Guide to Bluetooth Security. http://csrc.nist.gov/publications/drafts/800-121r1/Draft-SP800-121_Rev1.pdf.
Kilani, R., and Jensen, K., Mobile Authentication with NFC enabled Smartphones. http://ojs.statsbiblioteket.dk/index.php/ece/article/download/21229/18718.
Diffie, W. and Hellman, M.E., New directions in cryptography. https://www-ee.stanford.edu/~hellman/publications/24.pdf.
Host Card Emulation. https://developer.android.com/guide/topics/connectivity/nfc/hce.html.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © D.V. Ivanov, D.A. Moskvin, A.V. Myasnikov, A.F. Suprun, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Ivanov, D.V., Moskvin, D.A., Myasnikov, A.V. et al. Applying NFC for automated replication of user data. Aut. Control Comp. Sci. 51, 855–859 (2017). https://doi.org/10.3103/S0146411617080090
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411617080090